Apache HTTP Server Version 2.4
Available Languages: ko
Description: | Distributed Authoring and Versioning (WebDAV) functionality |
---|---|
Status: | Extension |
Module Identifier: | dav_module |
Source File: | mod_dav.c |
This module provides class 1 and class 2 WebDAV ('Web-based Distributed Authoring and Versioning') functionality for Apache. This extension to the HTTP protocol allows creating, moving, copying, and deleting resources and collections on a remote web server.
To enable mod_dav
, add the following to a container in your apache2.conf
file:
Dav On
This enables the DAV file system provider, which is implemented by the Loodule
directive.
In addition, a location for the DAV lock database must be specified in the global section of your apache2.conf
file using the DavLockDB
directive:
DavLockDB /usr/local/apache2/var/DavLock
The directory containing the lock database file must be writable by the Group
under which Apache is running.
You may wish to add a LimitRequestBody
directive has no effect on DAV requests.
DavLockDB "/usr/local/apache2/var/DavLock" <Directory "/usr/local/apache2/htdocs/foo"> Require all granted Dav On AuthType Basic AuthName DAV AuthFile ".wd" <LimitExcept GET POST OPTIONS> Require </LimitExcept> </Directory>
Since DAV access methods allow remote clients to manipulate files on the server, you must take particular care to assure that your server is secure before enabling mod_dav
.
Any location on the server where DAV is enabled should be protected by authentication. The use of HTTP Basic Authentication is not recommended. You should use at least HTTP Digest Authentication, which is provided by the SSL enabled connection.
In order for Group
. For this reason, it is important to control access to this . The DAV repository is considered private to Apache; modifying files outside of Apache (for example using FTP or filesystem-level tools) should not be allowed.
DavDepthInfinity
directive can be used to prevent PROPFIND
requests on a very large repository from consuming large amounts of memory. Another possible denial-of-service attack involves a client simply filling up all available disk space with many large files. There is no direct way to prevent this in Apache, so you should avoid giving DAV access to untrusted s.
One common request is to use mod_dav
to manipulate dynamic files (PHP scripts, CGI scripts, etc). This is difficult because a GET
request will always run the script, rather than ing its contents. One way to avoid this is to map two different URLs to the content, one of which will run the script, and one of which will allow it to be ed and manipulated with DAV.
Alias "/phparea" "/home/gstein/php_files" Alias "/php-source" "/home/gstein/php_files" <Location "/php-source"> Dav On ForceType text/plain </Location>
With this setup, http://example.com/phparea
can be used to access the output of the PHP scripts, and http://example.com/php-source
can be used with a DAV client to manipulate them.
Description: | Enable WebDAV HTTP methods |
---|---|
Syntax: | Dav On|Off|provider-name |
Default: | Dav Off |
Context: | directory |
Status: | Extension |
Module: | mod_dav |
Use the Dav
directive to enable the WebDAV HTTP methods for the given container:
<Location "/foo"> Dav On </Location>
The value On
is actually an alias for the default provider filesystem
which is served by the section above.
Description: | Allow PROPFIND, Depth: Infinity requests |
---|---|
Syntax: | DavDepthInfinity on|off |
Default: | DavDepthInfinity off |
Context: | server config, virtual host, directory |
Status: | Extension |
Module: | mod_dav |
Use the DavDepthInfinity
directive to allow the processing of PROPFIND
requests containing the header 'Depth: Infinity'. Because this type of request could constitute a denial-of-service attack, by default it is not allowed.
Description: | Minimum amount of time the server holds a lock on a DAV resource |
---|---|
Syntax: | DavMinTimeout seconds |
Default: | DavMinTimeout 0 |
Context: | server config, virtual host, directory |
Status: | Extension |
Module: | mod_dav |
When a client requests a DAV resource lock, it can also specify a time when the lock will be automatically removed by the server. This value is only a request, and the server can ignore it or inform the client of an arbitrary value.
Use the DavMinTimeout
directive to specify, in seconds, the minimum lock timeout to return to a client. Microsoft Web Folders defaults to a timeout of 120 seconds; the DavMinTimeout
can override this to a higher value (like 600 seconds) to reduce the chance of the client losing the lock due to network latency.
<Location "/MSWord"> DavMinTimeout 600 </Location>
Available Languages: ko